So the debate is whether to use encrypted tunnels or perimeter-based controls for security -- in other words, whether it is better to place more or less emphasis on the network perimeter? David ...